Covers some of the latest developments in wireless security penetration testing like WPS PIN brute forcing, cloud-based MS-CHAP decryption using ChapCrack, and many more

Who This Video Is For

This course is aimed at security professionals and IT professionals who want to learn about wireless penetration testing using the BackTrack Linux security distribution. The course assumes that you already know the basics of wireless networks and can operate at least one Linux distribution.

Table of Contents

Introduction

Introduction

Getting Started

Requirements for Setting Up Your Wireless Lab

Setting Up BackTrack (Download and Installation)

Setting Up Your Wireless Access Points (APs) and Clients

Wireless Networks – Rewards and Risks

WLAN Theory Essentials

An Introduction to Wireless Frames

An Introduction to aircrack-ng

WLAN Authentication – Getting Past Invisible Barriers

An Introduction to Wireless Authentication Protocols

Revealing Hidden SSIDs

Getting Past Open Authentication by Defeating MAC Filters

Bypassing Shared Key Authentication (SKA)

Exploiting WLAN Encryption Flaws

An Introduction to Wireless Encryption Protocols

Cracking WEP Encryption

Cracking WPA/WPA2 Pre-shared Keys

Connecting to Compromised Networks

WLAN Infrastructure – Threats and Countermeasures

Exploiting Default Credentials

Denial-of-service (DoS) Attacks

Attacking WPS

Evil Twin Attack and Honeypots

Advanced Client-based WiFi Attacks

An Introduction to Client-based Attacks

Attacking Clients using Honeypots

Hands-on Demonstration: Caffé Latte Attack

Hands-on Demonstration: Hirte Attack

Cracking WPA without an AP

WLAN Security – Taking It One Step Further

An Introduction to Man-in-the-middle (MITM) Attacks

Essential Steps: Wireless MITM Attacks

Eavesdropping and Session Hijacking

Detecting Client Security Settings

Enterprise Wireless Hacking

Setting up FreeRADIUS-WPE

Hands-on Demonstration: Cracking PEAP

Hands-on Demonstration: Cracking EAP-TTLS

Security Best Practices for Enterprise WLANs

WLAN Penetration Testing – Doing it effectively!

WLAN Penetration Testing: Doing it effectively

Course Conclusion

What You Will Learn

Crack WEP, WPA, WPA2, WPS, EAP/Radius based wireless networks

Creating a practice lab for wireless penetrating testing purposes

Sniff out and analyze wireless packets from the air

Penetrate wireless networks based on the enterprise versions of WPA and WPA2

Attack the WLAN infrastructure itself using DoS attacks, Fake APs, and other techniques

In Detail

Wi-Fi is a popular technology that helps satisfy our need for continuous connectivity with some inherent security risks and vulnerabilities. In a society with an increasing level of discoveable Wi-Fi networks, wireless penetration testing allows you to verify whether your own networks are as secure as you'd like them to be.

Armed with the essentials, you will learn how to conduct a host of cutting edge wireless attacks. You will learn how to execute attacks such as WLAN packet sniffing, revealing hidden SSIDs, open authentication by defeating MAC address filters, bypassing shared authentication, cracking WEP and WPA/WPA2 encryption.

In addition to documenting the essentials of wireless penetration testing, we will also discuss setting up rogue APs and wireless evil twins, client-based WEP cracking attacks, wireless infrastructure-based attacks, WPS PIN brute force attacks, denial of service (DoS) attacks, eavesdropping and session hijacking, EAP-based enterprise wireless hacking; and much more. Coverage also includes various countermeasures to protect wireless networks against these types of attacks, in order to help bolster the wireless security of any given network.

Authors

Farrukh Haroon Farhat

Farrukh Haroon Farhat is an information security professional with over 8 years of experience.
He currently works as a Security Analyst in IBM’s Global Technology Services (GTS) division. As a member of the Managed Security Services (MSS) operations team, Farrukh works with multi-vendor network security technologies, helping customers improve their security posture.
He's previously worked as the IT Security Manager for an emerging telecom operator based in the Middle East. He has also delivered various professional trainings related to Information Security and Networking.
Farrukh hold’s various industry certifications such as CISSP, CISA, CCIE Security (#20184), JNCIE-Security (#91) et al. He actively contributes to various online communities related to network security like Cisco Netpro. As a result of his contribution to Cisco’s official support community, he was awarded the ‘Cisco Designated VIP (Security)’ accreditation in 2011.

Alerts & Offers

Series & Level

We understand your time is important. Uniquely amongst the major publishers, we seek to develop and publish the broadest range of learning and information products on each technology. Every Packt product delivers a specific learning pathway, broadly defined by the Series type. This structured approach enables you to select the pathway which best suits your knowledge level, learning style and task objectives.

Learning

As a new user, these step-by-step tutorial guides will give you all the practical skills necessary to become competent and efficient.

Beginner's Guide

Friendly, informal tutorials that provide a practical introduction using examples, activities, and challenges.

Essentials

Fast paced, concentrated introductions showing the quickest way to put the tool to work in the real world.

Cookbook

A collection of practical self-contained recipes that all users of the technology will find useful for building more powerful and reliable systems.

Blueprints

Guides you through the most common types of project you'll encounter, giving you end-to-end guidance on how to build your specific solution quickly and reliably.

Mastering

Take your skills to the next level with advanced tutorials that will give you confidence to master the tool's most powerful features.

Starting

Accessible to readers adopting the topic, these titles get you into the tool or technology so that you can become an effective user.

Progressing

Building on core skills you already have, these titles share solutions and expertise so you become a highly productive power user.